Dvmap: An Android Malware with Code Injection

Recently, Kaspersky Lab found an android malware that have the capacity to inject malicious code to Android system.

Recent times are tough for Android, last week, Android was a target for malvertising and now a Trojan horse is on the move, infecting and taking control of devices through the Android native app store; Google Play.

Dvmap Torjan Android Malware

Dvmap, an Android trojan is found by the cybersecurity researchers at Kaspersky Lab and is the first malware to be found with code injection built into it.

Back in may 2017, the malware creators uploaded a clean Android application named as "colour block" to Google Play so as to pass security checks and later updated the applications with malicious code to infect the devices who already downloaded the clean version. The app has been updated like this at least 5 times between 18 April and 15 May.

Dvmap Colour Block Malware

According to Kaspersky Lab, the Trojan uses special techniques to gain the root access of the infected devices and also affects the system libraries of Android devices running in both the 32-bit and 64-bit architecture.

Kaspersky Lab reported in their blog that "Dvmap the first Android malware that injects malicious code into the system libraries in runtime, and it has been downloaded from the Google Play Store more than 50,000 times."

After Kaspersky Lab reported the infecting malware to Google, it has been removed from the Play Store.

The researchers at Kaspersky learned that the Trojan has new techniques to get the root access and its main purpose is to hack into the system and execute downloaded files with root rights.

The lab added that a trojan that has 64-bit support is rare and upon further study, they learned that the Trojan have a command and control that reports all its actions back to malware creators but never found any files attached to it, which suggests that this trojan still in testing mode.

Kaspersky added that"uncovering this malware at such an early stage, we will be able to prevent a massive and dangerous attack when the attackers are ready to actively use their methods."

Written by .
Last updated on 12-06-2017. Published on 12-06-2017.
Published by Mobiles4Sale in category News
Add Your Comment
Name :

Comment :

1341
Safety Tips for Buyers
  • Never pay the Seller before receiving and verifying the device.
  • Never scan any QR code or share OTP.
  • Ask for bill, box, accessories etc to make sure its not a stolen device.
  • Meet the Seller in a safe place preferably in daytime.
Safety Tips for Sellers
  • Never handover the phone before receiving the full amount.
  • Avoid Buyers from foreign countries.
  • Beware of Buyers from other cities.
  • Never share sensitive data of your bank account or credit card.
  • Never scan any QR code or share OTP.
  • Meet the Buyer in a safe place preferably in daytime.
  • Make sure to delete all personal data from the phone before selling.
  • Format the device or Reset to factory settings before selling.